A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment
暂无分享,去创建一个
Jinjun Chen | Xuyun Zhang | Chunhua Hu | Chi Yang | Lianyong Qi | Wan-Chun Dou | Xuyun Zhang | Chi Yang | Jinjun Chen | Lianyong Qi | Wanchun Dou | Chunhua Hu
[1] Nicolas Durand,et al. Probabilistic Approach for Diversifying Web Services Discovery and Composition , 2016, 2016 IEEE International Conference on Web Services (ICWS).
[2] Xingming Sun,et al. Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.
[3] Jiguo Yu,et al. Time-Aware IoE Service Recommendation on Sparse Data , 2016, Mob. Inf. Syst..
[4] Kim-Kwang Raymond Choo,et al. Android mobile VoIP apps: a survey and examination of their security and privacy , 2016, Electron. Commer. Res..
[5] Jinjun Chen,et al. Weighted principal component analysis-based service selection method for multimedia services in cloud , 2014, Computing.
[6] Lan Huang,et al. An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints , 2017, Secur. Commun. Networks.
[7] Zibin Zheng,et al. A Spatial-Temporal QoS Prediction Approach for Time-aware Web Service Recommendation , 2016, ACM Trans. Web.
[8] Mingdong Tang,et al. WSWalker: A Random Walk Method for QoS-Aware Web Service Recommendation , 2015, 2015 IEEE International Conference on Web Services.
[9] Kotagiri Ramamohanarao,et al. MRMondrian: Scalable Multidimensional Anonymisation for Big Data Privacy Preservation , 2017, IEEE Transactions on Big Data.
[10] Kim-Kwang Raymond Choo,et al. A technique to circumvent SSL/TLS validations on iOS devices , 2017, Future Gener. Comput. Syst..
[11] Yutao Ma,et al. Mining Domain Knowledge on Service Goals from Textual Service Descriptions , 2020, IEEE Transactions on Services Computing.
[12] Susan B. Shimanoff. Expressing Emotions in Words: Verbal Patterns of Interaction , 1985 .
[13] Xiaoqing Frank Liu,et al. A Collaborative Filtering Method for Personalized Preference-Based Service Recommendation , 2015, 2015 IEEE International Conference on Web Services.
[14] Piotr Indyk,et al. Similarity Search in High Dimensions via Hashing , 1999, VLDB.
[15] MengChu Zhou,et al. An Incremental-and-Static-Combined Scheme for Matrix-Factorization-Based Collaborative Filtering , 2016, IEEE Transactions on Automation Science and Engineering.
[16] Jian Shen,et al. A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..
[17] Li Shang,et al. An algorithm for efficient privacy-preserving item-based collaborative filtering , 2016, Future Gener. Comput. Syst..
[18] Yuming Zhou,et al. Structural Balance Theory-Based E-Commerce Recommendation over Big Rating Data , 2018, IEEE Transactions on Big Data.
[19] J. Rodgers,et al. Thirteen ways to look at the correlation coefficient , 1988 .
[20] Andrei Z. Broder,et al. On the resemblance and containment of documents , 1997, Proceedings. Compression and Complexity of SEQUENCES 1997 (Cat. No.97TB100171).
[21] Rui Duan,et al. Hybrid collaborative filtering for high-involvement products: A solution to opinion sparsity and dynamics , 2015, Decis. Support Syst..
[22] Kim-Kwang Raymond Choo,et al. Mobile cloud security: An adversary model for lightweight browser security , 2017, Comput. Stand. Interfaces.
[23] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[24] Kim-Kwang Raymond Choo,et al. Pervasive social networking forensics: Intelligence and evidence from mobile device extracts , 2017, J. Netw. Comput. Appl..
[25] Jinjun Chen,et al. HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications , 2015, IEEE Transactions on Parallel and Distributed Systems.
[26] Zibin Zheng,et al. Investigating QoS of Real-World Web Services , 2014, IEEE Transactions on Services Computing.
[27] Kim-Kwang Raymond Choo,et al. Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps , 2018, Future Gener. Comput. Syst..
[28] Xuyun Zhang,et al. A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.
[29] Athanasios V. Vasilakos,et al. A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps , 2017, Appl. Math. Comput..
[30] MengChu Zhou,et al. A Nonnegative Latent Factor Model for Large-Scale Sparse Matrices in Recommender Systems via Alternating Direction Method , 2016, IEEE Transactions on Neural Networks and Learning Systems.
[31] David Heckerman,et al. Empirical Analysis of Predictive Algorithms for Collaborative Filtering , 1998, UAI.
[32] Hu Chun-hua,et al. User similarity-based collaborative filtering recommendation algorithm , 2015 .
[33] Zibin Zheng,et al. A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation , 2015, 2015 IEEE International Conference on Web Services.
[34] Linpeng Huang,et al. A Web service QoS prediction approach based on time- and location-aware collaborative filtering , 2014, Service Oriented Computing and Applications.
[35] Zhe Liu,et al. Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions , 2017, Comput. Secur..
[36] Jian Shen,et al. $$\varvec{\textit{KDVEM}}$$KDVEM: a $$k$$k-degree anonymity with vertex and edge modification algorithm , 2015, Computing.
[37] Laurence T. Yang,et al. Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies , 2017, IEEE Internet of Things Journal.
[38] Jenq-Haur Wang,et al. A Distributed Hybrid Recommendation Framework to Address the New-User Cold-Start Problem , 2015, 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom).
[39] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[40] Kim-Kwang Raymond Choo,et al. The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps , 2017, Mob. Networks Appl..
[41] Bin Guo,et al. A privacy-preserving multimedia recommendation in the context of social network based on weighted noise injection , 2019, Multimedia Tools and Applications.
[42] Xuyun Zhang,et al. Two-Phase Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation , 2017, CSS.
[43] Jin Wang,et al. Privacy-Preserving Smart Similarity Search Based on Simhash over Encrypted Data in Cloud Computing , 2015 .
[44] Kyung-Yong Chung,et al. Categorization for grouping associative items using data mining in item-based collaborative filtering , 2011, Multimedia Tools and Applications.
[45] Jian Shen,et al. Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing , 2019, IEEE Transactions on Dependable and Secure Computing.
[46] Jiguo Yu,et al. A Context-Aware Service Evaluation Approach over Big Data for Cloud Applications , 2020, IEEE Transactions on Cloud Computing.